adplus-dvertising
frame-decoration

Question

What is the purpose of the -sU flag in Nmap?

a.

To conduct a TCP ACK scan

b.

To perform a TCP connect scan

c.

To conduct a UDP-only scan

d.

To identify UDP-based services

Answer: (c).To conduct a UDP-only scan Explanation:The -sU flag in Nmap is used to conduct a UDP-only scan, allowing you to identify UDP-based services.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is the purpose of the -sU flag in Nmap?

Similar Questions

Discover Related MCQs

Q. How does the -sA flag in Nmap differ from other scan techniques?

Q. What does the -T0 to -T5 flags in Nmap impact?

Q. What does the -Pn flag in Nmap do?

Q. What is the purpose of the -IL flag in Nmap?

Q. Which flag in Nmap is used for service version detection?

Q. What is the default speed setting for Nmap scans?

Q. Which flag in Nmap is used for OS detection?

Q. What is the purpose of the -oA flag in Nmap?

Q. What additional information does Zenmap, the official graphical user interface for Nmap, provide?

Q. What does the -sT flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -sV flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the purpose of the -Pn flag in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -p 1-65435 flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -T2 flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the purpose of the -oA flag in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the target's hostname in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. How can the Nmap scripting engine (NSE) be used for vulnerability scanning?

Q. Why is understanding the topology of a network crucial for a penetration tester?

Q. How can topology diagrams be generated for a network?

Q. What type of information can a topology map provide to a penetration tester?